Attack Types: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
(→Links) |
||
Line 17: | Line 17: | ||
*[http://www.denialinfo.com/ Denial of Service (DoS) Attack Resources] |
*[http://www.denialinfo.com/ Denial of Service (DoS) Attack Resources] |
||
*[http://www.cert.org/advisories/CA-1998-01.html CERT advisory on Smurf DoS attacks] |
*[http://www.cert.org/advisories/CA-1998-01.html CERT advisory on Smurf DoS attacks] |
||
*[http://www.pentics.net/denial-of-service/white-papers/smurf.cgi "Smurfing" description and information to minimize effects] |
Revision as of 21:15, 14 November 2004
[Right now, this topic is just a list of correlated topics. But that will change soon.]
- Spoofing
- Man in the Middle
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Botnets
- Social Engineering
Literature
- Russell, Cunningham: Maximum Protection, MITP-Verlag Bonn, 2001, ISBN: 9783826606878
- Eckert: IT-Sicherheit, Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
- Cheswick, Bellovin, Rubin: Firewalls und Sicherheit im Internet, Addison-Wesley, 2004, ISBN: 9827321174